botnet network DDoS compliance malware BEC IDS phishing zero- day IP business continuity vishing Dark Web insider threat Proofpoint cryptography OS SyssecAdmin firewall training spoofing Cyber Defense packet ransomware security awareness pentest risk assessment WISP spyware incident response encryption antivirus IOC exploit Security Operations APT availability defense evasion password breach CIA triad escalation worm rootkit FTP identity theft VPN virus confidentiality hacker risk passphrase bug PHI Defense- in-depth admin HIPAA integrity smishing spam social engineering cyber attack incident resilience Cyber Security IPS EDR vulnerability MFA IoT security policy PII botnet network DDoS compliance malware BEC IDS phishing zero- day IP business continuity vishing Dark Web insider threat Proofpoint cryptography OS SyssecAdmin firewall training spoofing Cyber Defense packet ransomware security awareness pentest risk assessment WISP spyware incident response encryption antivirus IOC exploit Security Operations APT availability defense evasion password breach CIA triad escalation worm rootkit FTP identity theft VPN virus confidentiality hacker risk passphrase bug PHI Defense- in-depth admin HIPAA integrity smishing spam social engineering cyber attack incident resilience Cyber Security IPS EDR vulnerability MFA IoT security policy PII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
botnet
network
DDoS
compliance
malware
BEC
IDS
phishing
zero-day
IP
business continuity
vishing
Dark Web
insider threat
Proofpoint
cryptography
OS
SyssecAdmin
firewall
training
spoofing
Cyber Defense
packet
ransomware
security awareness
pentest
risk assessment
WISP
spyware
incident response
encryption
antivirus
IOC
exploit
Security Operations
APT
availability
defense evasion
password
breach
CIA triad
escalation
worm
rootkit
FTP
identity theft
VPN
virus
confidentiality
hacker
risk
passphrase
bug
PHI
Defense-in-depth
admin
HIPAA
integrity
smishing
spam
social engineering
cyber attack
incident
resilience
Cyber Security
IPS
EDR
vulnerability
MFA
IoT
security policy
PII